Tag Archives What is DDoS Protection

Distributed Denial-of-service (DDoS) attacks are going up in numbers and have evolved into complex and overwhelming security challenges for organizations, irrespective of the size - small, medium or large sized. Although these attacks are not a recent happening – they occurred in December 2014 and December 2015; the methods and resources available to carry out such strikes have dramatically transformed…

On 21st October, 2016 – Twitter, Spotify, Reddit, and several other websites came crashing down after a group of cyber-attackers launched a massive DDoS attack on the servers of Dyn, effectively leaving a massive chunk of the population without access to the Internet. What does it take to bring down Large Server Networks and Modern Firewalls you ask? Several gbps…

How to search and use IoT for Hacking

October saw one of the  most serious instances of taking down of the Internet using Internet of Things (IoT) devices that disrupted some of the major websites such as twitter, CNN and GitHub to name a few. It is something incomprehensible for the average Joe that an electrical Toaster could have brought down half the Internet that day. And yet,…

Launching a DDoS is Piece of Cake

If it was believed that only professional hackers can launch a Distributed Denial of Service (DDoS) Attack, think twice! Hackers have recently released the source code of the malware that enabled them to create a massive network of botnets and launch the crippling DDoS attack on cyber security analyst, Brian Krebs's website. The malware named "Mirai" and posted on HackForum…

Hackers who brought down the Internet

A group of anonymous (not necessarily belonging to the group going by the namesake) hackers are busy working on a new challenge. Taking down the Internet. Now imagine, voters queuing up to vote for the US presidential elections and the Internet goes kaput at some voting booths. A scenario that could ruin a particular candidate's chances of winning. According to…

The Backhat Hat / Def Con conference demonstrated a variety of attacks through the browser one of which is called the H.E.I.S.T attack which again stands for "HTTP Encrypted Information can be Stolen through TCP windows",. This is a new way hackers have discovered to find out a way for JavaScript to determine the size of data being sent through…

This news may be quite short lived though as Fiverr the site that offers freelancers an opportunity to make small change and help people get work done on the cheap, has deleted the account of the user who had offered a DDoS as a service for $5 This may be not news as online hacking services have been facing lot…

According to security firm F5 Networks, as early as 2020, there would be billions of IoT endpoints that need to be defended. According to the company a recent evidence of using IoT for conducting a DDoS attack was discovered a major cable operator. Hackers pinged cameras and any other internet-connected devices in homes to create a massive "nos" traffic in…

The Secure Wallet Service for Bitcoins from Coinkite Inc. will stop operations after the firm decided to shut down its shutters as a result of continuous  DDoS Attacks and Governmental interference. This is not very uncommon with Bitcoin exchanges worldwide as they are often the target of  cyber-attacks and some of these operations fight back while others simply give up.…

There is nothing new about Distributed Denial of Service (DDOS) attacks and organizations big or small are nowadays target of these attacks and are a tough nut to crack. And many a time the organizations give into black mail to end these attacks. Why? The reason is DDOS attacks originate from unknown sources, use not one but multiple protocols, employ…

12
Close